UPM Institutional Repository

Analysis of known and unknown malware bypassing techniques


Citation

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood (2013) Analysis of known and unknown malware bypassing techniques. International Journal of Information Processing and Management, 4 (6). pp. 50-59. ISSN 2093-4009; ESSN: 2233-940X

Abstract

Nowadays, malware attacks are the most expensive damages for organizations in different types of computer and network systems. While different types of attacks are well surveyed and documented, little details related to bypass malware detections and defenses are provided in the public domains. Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. Right after that, an unknown malware detection system to protect organization’s internal networks from unknown and known malware before they reach into the victims’ systems is surveyed and provided.


Download File

[img]
Preview
PDF (Abstract)
Analysis of known and unknown malware bypassing techniques.pdf

Download (179kB) | Preview

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
Publisher: Advanced Institute of Convergence Information Technology
Keywords: Malware defense; Bypassing malware; Penetration testing; Malware detection
Depositing User: Ms. Nida Hidayati Ghazali
Date Deposited: 09 Feb 2015 07:09
Last Modified: 06 Oct 2015 07:43
URI: http://psasir.upm.edu.my/id/eprint/30589
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item